austin-taylor / bluewallLinks
Bluewall is a firewall framework designed for offensive and defensive cyber professionals.
☆106Updated 6 years ago
Alternatives and similar repositories for bluewall
Users that are interested in bluewall are comparing it to the libraries listed below
Sorting:
- Security Onion Elastic Stack☆46Updated 4 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- ☆30Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆43Updated 5 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- ☆61Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated 2 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated 3 weeks ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- automate your MISP installs☆68Updated 5 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 2 months ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 7 months ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Mass static malware analysis tool☆95Updated 3 years ago